213
Defining your security environment
Controlling full application inspection of traffic
Prerequisites
Complete the following task before beginning this procedure.
■
“Configuring access for Web traffic”
To enable an external Web proxy
1
In the SGMI, in the left pane, under Assets, click
Proxies
.
2
In the right pane, on the Proxies tab, click the HTTP proxy, and then click
Properties
.
3
In the Proxy Properties dialog box, on the Web Proxy tab, in the External Web Proxy text box, type
the IP address of the external Web proxy.
4
In the External Web Proxy Port text box, type the port number on which the external Web proxy
listens.
5
Click
OK
.
6
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“Proxy Properties: HTTP—Web Proxy tab”
Configuring the HTTP proxy to listen on additional ports for standard connections
By default, the HTTP proxy listens on port 80 for normal HTTP connections. You can use the procedure
in this section to configure the security gateway to listen on additional ports for these types of
connections. Changes you make take affect immediately after the configuration is saved and activated.
Prerequisites
Complete the following task before beginning this procedure.
■
“Configuring access for Web traffic”
To configure the HTTP proxy to listen on additional port for standard connections
1
In the SGMI, in the left pane, under Assets, click
Proxies
.
2
In the right pane, on the Proxies tab, click the HTTP proxy, and then click
Properties
.
3
In the Proxy Properties dialog box, on the Additional HTTP Ports tab, type in a new port, and then
click
Add
.
4
Click
OK
.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
None.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...